All monitoring for insider threats
jimd

Network Security: Using Dashboards to Aid Your Investigation

In my last post, titled Network Visibility: Using Dashboards to Tell a Deeper Story, we discussed how the dashboard feature of Scrutinizer can be...

jimd

Network Visibility: Using Dashboards to Tell a Deeper Story

When it comes to network traffic monitoring, a single and unified view of your networking infrastructure is essential in ensuring that your environment is...

jimd

Three Strategies to Catch and Stop Insider Threats

Earlier this year I worked on a document that addressed some of the common misconceptions about Scrutinizer. One of the subjects that caught my...